How to Defend Against Email Fraud - in partnership with CSO

Online criminals used to favor scattershot campaigns that relied on emailing hundreds of people in the hopes of tricking even a few of them into clicking on malicious attachments. These days, however, businesses face a new threat as ever more-calculating attackers conduct extensive research to craft carefully worded emails designed to emulate the CEO, CFO or other key executive.

These emails, known as email fraud or business email compromise (BEC), are fast exploiting perceptual weak spots by adopting executives' identities in emails pressuring employees into sending sensitive files or wiring large sums of money to a bank account.

Recent FBI figures suggest the attacks are costing victims an average of $US130,000 per incident and cost more than $US2.3 billion worldwide. Furthermore, it is difficult if not impossible to get the money back.

Please join the Australian Federal Police, CERT Australia and Proofpoint for a webinar to discuss the emerging threat and strategies for defending against it. Over the course of the session, you will learn:

· How cybercriminals craft Email Fraud messages and where they get their information
· How to help executives hide the information that cybercriminals may be using to shape Email Fraud
· Why your current email filtering solution may struggle to keep up, and what technologies can help in the fight against Email Fraud campaigns
· What kind of business controls can be put in place to protect against Email Fraud manipulations

You likely know that email fraud is costing organizations billions of dollars. But do you know why these attacks continue to reach new levels of success? Proofpoint researchers have uncovered the latest email fraud trends, tactics, and techniques that are impacting organizations around the world.

Join us and learn

•Why organizations haven’t solved one of the oldest email scams
•The strategies needed to stop these attacks before they reach your employees, customers, and business partners
•What a best practice email fraud solution should include

‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

During the webinar, we’ll cover:
-- Trends in volume and type of attack providing useful insights for both defenders and organizations.
-- Ransomware and Email Fraud - how effective have they become and who is being targeted the
most.
-- How bad actors are using cloud services to their benefit
-- Live Q&A with the speakers

The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

Join Proofpoint Director of Threat Intelligence as we discuss:

-- Trends in volume and type of attack providing useful insights for both defenders and organizations.
-- Ransomware and Email Fraud - how effective have they become and who is being targeted the
most.
-- How bad actors are using cloud services

Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

Join us for this webinar where you will learn:
* About the latest trends and tactics used by threat actors that target your organization
* How to assess your users’ susceptibility to phishing attacks
* To respond to threats through end-user training and reporting

Migrating to Office 365 brings great benefits and new risks. You may need third-party tools to ensure your Office 365 deployment is a success. Join Proofpoint while we discuss current concerns for IT and security and how to address them.

Join Michael Osterman from Osterman Research and our panel of experts, April 26, 10 AM PT as they discuss how to overcome challenges including:

Today’s cyberattacks target individuals, not infrastructure, and phishing is one of the most successful and enduring types of attack.

Join this webinar to see how the newest member of Proofpoint family - Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, reduces phishing risk by enabling phishing simulation and training to change end-user behaviour.

The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades but there also come these days with some inherit increasing risks. Join this webinar and learn about:

Think you have a handle on threats beyond the perimeter? Watch this webinar and learn how Proofpoint helps you gain situational awareness of potential threats against your key executives and locations. Join us as we walk you through our detection system that provides in-depth scanning across all digital channels, including the surface, deep, dark web and social media.

In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.

Join this webinar to learn:
- Findings from our latest Email Fraud study
- Email Fraud trends from 2017 and threats to look out for in 2018
- Helpful tips to protect your people, data and brand against Email Fraud
- Live Q&A with the speakers

Over the past decade, enterprises have purchased a wide range of security tools and systems, many designed to solve only one problem. Today, security teams are looking for ways to aggregate and integrate the capabilities of these systems to help identify sophisticated threats and improve overall enterprise security.

In this Dark Reading webinar, attendees will learn strategies for tying security systems together and orchestrating them to build a better data defense.

The evolving threat of ransomware is more dangerous than ever and is here to stay! In early 2017, ‘Wannacry’ and ‘Petya’ created havoc and made it to mainstream media. Even more recently, in Q4 2017, ransomware remained the top payload distributed by malicious messages accounting for 57% of all malicious message volume. Showing no signs of abating, cybersecurity professionals must reassess their ransomware-readiness. The best protection from ransomware is to stay informed and learn what critical safety measures your organisation can take to prevent such an attack from occurring.

Join this webinar for an overview of:

- How ransomware works and the latest attacks
- The most common challenges organizations face in combating ransomware
- Strategies for mitigating ransomware attacks of all varieties

While ransomware and other high profile, high volume attacks have made many headlines, email fraud has silently been attacking companies around the world. In 2017, over 80% of organizations experienced at least one email fraud attack. Email fraud attacks are low volume attacks that impersonate a person in authority to try and trick the victim into sending money or data out of the organization.

Join us and learn how attackers use email fraud to attack their victims and about the framework that can prevent these attacks for impacting your business.

Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:

Organizations today are facing increased targeted attacks using social engineering tactics. Last year, we saw a 200% increase from cyber criminals registering look-alike domains to pose as employees or partners by spoofing email addresses, or creating deceptive links for victims to click on.

Join us for a live webinar where you will learn:
* The latest trends and tactics used to commit email fraud
* How to gain better visibility into any domain spoofing your organization
* How to proactively protect your organization, employees, partners and customers from email fraud

Financial institutions - specifically FINRA and SEC regulated organizations - are required to protect their firm’s and clients’ data, capture and archive business records and make them discoverable, and enable secure and compliant use of social media. They face challenges of swiftly producing required records during legal discovery and regulatory audits + demonstrating ongoing supervision of their employees despite and increased regulatory landscape, exponential data growth, decreases in staff and ongoing demand to lower costs

Get up to speed on the compliance and eDiscovery challenges that enterprises face — and the Proofpoint solution that meets them.

Watch industry experts take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.